ExamGecko
Home Home / CompTIA / 220-1101

CompTIA 220-1101 Practice Test - Questions Answers, Page 59

Question list
Search
Search

List of questions

Search

Related questions











A technician just finished building a new PC and needs to install a firmware update for the system board UEFI. The technician is experiencing issues while accessing the USB key. Which of the following features should the technician most likely disable in order to complete this task?

A.
TPM security
A.
TPM security
Answers
B.
USB 3.0 support
B.
USB 3.0 support
Answers
C.
PXE boot capability
C.
PXE boot capability
Answers
D.
Secure Boot
D.
Secure Boot
Answers
Suggested answer: D

Explanation:

Secure Boot is a feature of UEFI (Unified Extensible Firmware Interface) that prevents unauthorized software from running during the boot process. Secure Boot verifies the digital signature of the boot loader and the operating system, and only allows them to run if they are signed by a trusted authority. However, Secure Boot can also prevent some legitimate software, such as firmware updates, from running if they are not signed or recognized by the system. Therefore, the technician may need to disable Secure Boot in order to install a firmware update for the system board UEFI from a USB key34. The other features are not likely to interfere with the firmware update, unless they are misconfigured or incompatible with the USB key.

Reference

3: bios - Can't enable secure boot in Windows 11

4: Acer aspire e5-571 Legacy Secure Boot?

A user reports that when pressing a radio button on a tablet, an item a couple of inches to the right of the pressed button gets selected instead. Which of the following components may need to be replaced?

A.
Gyroscope
A.
Gyroscope
Answers
B.
Battery
B.
Battery
Answers
C.
Digitizer
C.
Digitizer
Answers
D.
Glass
D.
Glass
Answers
Suggested answer: C

Explanation:

A digitizer is a component that converts the touch input on a tablet screen into digital signals that can be processed by the device. A digitizer consists of a thin layer of transparent material that covers the glass screen and has sensors that detect the position and pressure of the touch. If the digitizer is damaged, misaligned, or poorly calibrated, it can cause inaccurate touch input, such as selecting the wrong item or not responding at all12. Therefore, the most likely cause of the issue in this scenario is a faulty digitizer that may need to be replaced. The other components are not directly related to the touch input functionality of the tablet. A gyroscope is a sensor that measures the orientation and rotation of the device3. A battery is a power source that supplies electricity to the device4. A glass is a protective layer that covers the screen and prevents scratches and cracks5.

Reference

1: What is a Digitizer? - Definition from Techopedia

2: How to Fix a Broken Digitizer on a Tablet | Chron.com

3: What is a Gyroscope Sensor in Mobile Phones? - Definition from Techopedia

4: What is a Battery? - Definition from Techopedia

5: What is Glass? - Definition from Techopedia

A company wants to add virtual servers to handle unusually high web traffic usage. Which of the following is the most efficient way?

A.
Community cloud
A.
Community cloud
Answers
B.
File synchronization
B.
File synchronization
Answers
C.
Rapid elasticity
C.
Rapid elasticity
Answers
D.
Cloud VDI
D.
Cloud VDI
Answers
Suggested answer: C

Explanation:

Rapid elasticity is the ability of a cloud service to scale up or down the resources (such as virtual servers, storage, bandwidth, etc.) according to the demand of the users. This is an efficient way to handle unusually high web traffic usage, as it allows the company to provision more virtual servers when needed and release them when not needed, without wasting resources or paying for unused capacity. Rapid elasticity also improves the performance and availability of the web service, as it can adjust to the fluctuations in traffic and avoid overloading or downtime.

Reference

Rapid Elasticity in Cloud Computing: On-Demand Scaling for Business

Chapter 4: Virtualization and Cloud Computing

Which of the following is the best environment for an engineer to use for research purposes?

A.
Host
A.
Host
Answers
B.
Sandbox
B.
Sandbox
Answers
C.
Simulated production
C.
Simulated production
Answers
D.
Cross-platform
D.
Cross-platform
Answers
Suggested answer: B

Explanation:

A sandbox is a virtual environment that isolates the engineer's research activities from the rest of the system. This allows the engineer to test, experiment, and modify the system without affecting the real data, applications, or settings. A sandbox is the best environment for research purposes because it provides a safe and controlled way to explore new ideas, simulate scenarios, and troubleshoot problems. A sandbox can also be easily reset or deleted after the research is done.

Reference

What is a Sandbox Environment?

Chapter 4: Virtualization and Cloud Computing

A user returns to work after a two-week vacation and cannot connect to an internal server. The remote drives were working the last time the user accessed them. Which of the following steps should the technician take next?

A.
Conduct external research on the server software vendor's website.
A.
Conduct external research on the server software vendor's website.
Answers
B.
Reference the server vendor's documentation for guidance.
B.
Reference the server vendor's documentation for guidance.
Answers
C.
Confirm a theory and determine the next steps to resolve the issue.
C.
Confirm a theory and determine the next steps to resolve the issue.
Answers
D.
Determine if any infrastructure changes have been made.
D.
Determine if any infrastructure changes have been made.
Answers
Suggested answer: D

Explanation:

The first step in troubleshooting any network connectivity issue is to identify the scope and source of the problem. The technician should check if any infrastructure changes have been made during the user's absence, such as updates, patches, configuration changes, or hardware replacements. These changes could affect the network settings, firewall rules, permissions, or compatibility of the user's device or the server. The technician should also verify if other users or devices can access the server or if the problem is isolated to the user's device. By determining if any infrastructure changes have been made, the technician can narrow down the possible causes and formulate a theory to test.

Reference

Chapter 5: Hardware and Network Troubleshooting

How to fix HTTP 500 internal server error?

Remote desktop connection: An internal error has occurred

Which of the following best describes metered utilization for cloud computing?

A.
Cloud resources are billed to clients based on usage.
A.
Cloud resources are billed to clients based on usage.
Answers
B.
Cloud resources are shared with other companies conducting similar business.
B.
Cloud resources are shared with other companies conducting similar business.
Answers
C.
Cloud resources are available at a fixed amount for a fixed price.
C.
Cloud resources are available at a fixed amount for a fixed price.
Answers
D.
Cloud resources are located in the on-site data center.
D.
Cloud resources are located in the on-site data center.
Answers
Suggested answer: A

Explanation:

Metered utilization for cloud computing is a pricing model where cloud service providers charge clients based on the amount of resources they consume, such as network bandwidth, storage space, CPU cycles, or memory. This allows clients to pay only for what they use, rather than a fixed amount or a subscription fee. Metered utilization can also enable clients to scale their cloud resources up or down according to their needs and demand.

Understanding Metered Billing For Cloud Infrastructure - Togai: This article explains the concept of metered billing, its advantages, and how it works for cloud infrastructure services.

Usage Metering and Throttling in Cloud Computing: This article discusses the importance of metering and throttling in cloud computing, and how they are implemented in WSO2 Stratos, a cloud platform as a service (PaaS) solution.

Cloud Volumes Service Metered Billing: Control Your Cloud ... - NetApp: This article describes how NetApp's Cloud Volumes Service offers metered billing for cloud storage, and how it can help clients reduce their cloud costs and optimize their performance.

Which of the following provides the highest level of isolation from the host operating system?

A.
Type Il hypervisor
A.
Type Il hypervisor
Answers
B.
Resource pooling
B.
Resource pooling
Answers
C.
Hardware-assisted virtualization
C.
Hardware-assisted virtualization
Answers
D.
Single-node clustering
D.
Single-node clustering
Answers
Suggested answer: A

Explanation:

A type II hypervisor is a software application that runs on top of a host operating system and creates virtual machines that are isolated from the host. A type II hypervisor provides the highest level of isolation from the host operating system because it does not have direct access to the hardware resources and relies on the host operating system for drivers and services. A type II hypervisor also allows the guest operating systems to run different types of operating systems than the host.

A technician is configuring a desktop RAID to allow for the best I/O performance and the most storage capacity possible. Which of the following RAID types should the technician use?

A.
0
A.
0
Answers
B.
5
B.
5
Answers
C.
6
C.
6
Answers
D.
10
D.
10
Answers
Suggested answer: A

Explanation:

RAID 0 is a disk array configuration that splits data across two or more disks without parity or mirroring. RAID 0 provides the best I/O performance because it allows parallel read and write operations on multiple disks. RAID 0 also provides the most storage capacity possible because it does not use any disk space for redundancy. However, RAID 0 does not provide any fault tolerance and increases the risk of data loss if any disk fails.

A company recently enabled two-factor authentication in order to enhance security. Users should be prompted for two-factor authentication when working outside of the office, but are also being prompted when connecting to the office Wi-Fi. Which of the following should the technician do?

A.
Leave the current rules in place and disable Wi-Fi on all devices.
A.
Leave the current rules in place and disable Wi-Fi on all devices.
Answers
B.
Implement allow listing and add the office IP address as an exception.
B.
Implement allow listing and add the office IP address as an exception.
Answers
C.
Remove two-factor authentication from the users' accounts.
C.
Remove two-factor authentication from the users' accounts.
Answers
D.
Substitute hard tokens in place of soft tokens.
D.
Substitute hard tokens in place of soft tokens.
Answers
Suggested answer: B

Explanation:

Allow listing is a security technique that allows only specific IP addresses or domains to access a network or a service. By adding the office IP address as an exception, the company can prevent two-factor authentication from being triggered when users are connected to the office Wi-Fi, since the office network is considered trusted. This way, users will only be prompted for two-factor authentication when working outside of the office, which enhances security.

What Is Two-Factor Authentication (2FA)? | Microsoft Security: This article explains the concept of two-factor authentication, its benefits, and its methods.

Change your two-step verification method and settings - Microsoft Support: This article shows how to manage your security verification methods and settings for your work or school account, including how to turn on two-factor verification prompts on a trusted device.

2FA Directory: This website lists all the sites that support two-factor authentication, and the methods they use.

A technician needs to assign an IP address to a Windows PC, but a network connection is unavailable. Which of the following tools would be best for the technician to use?

A.
DHCP
A.
DHCP
Answers
B.
TFTP
B.
TFTP
Answers
C.
APIPA
C.
APIPA
Answers
D.
DNS
D.
DNS
Answers
Suggested answer: C

Explanation:

Automatic Private IP Addressing (APIPA) allows a Windows PC to automatically assign itself an IP address in the range of 169.254.0.1 to 169.254.255.254 when it's unable to obtain an IP address from a DHCP server. This feature is particularly useful in situations where the PC cannot connect to the network or when DHCP services are unavailable. While APIPA addresses are not routable and thus not suited for large networks, they enable basic networking functionality for small ad-hoc or local networks.

Total 718 questions
Go to page: of 72